Realistically speaking, if your software or system uses the SHA-1 hashing algorithm, it is unlikely that it will be exploited in the foreseeable future. But it is also extremely difficult to be certain that your system won't be the exception.
Unexpected though it may have been, the SHA-1 collision found by researchers at CWI Amsterdam and Google earlier this year is one of the biggest security stories of 2017 thus far.… https://virusbulletin.com/blog/2017/03/why-sha-1-collision-means-you-should-stop-using-algorithm/
Researchers from Google and CWI Amsterdam have created the first known collision of the SHA-1 hashing algorithm, making a very strong case to ditch it.
Researchers from Google and CWI Amsterdam have created the first publicly known SHA-1 collision.
SHA-1 is a hashing algorithm: it turns data of arbitrary size (such as a string… https://virusbulletin.com/blog/2017/02/sha-1-hashing-algorithm-has-been-shattered/